Answer:
your mom
Explanation:
83\2+58+3^3+95*2/10
it's computer pls help
Answer:
145.5
Explanation:
I was unsure what you needed done, but if it was a math equation then that is your answer :)
Hope this helped <3 Brainliest please? :)
Complete each sentence by choosing the correct answer from the drop-down menus.
The
printer works by spraying ink onto paper.
use a laser beam and static electricity to transfer words and images to paper.
are primarily business printers because they produce high-quality printed material and are expensive to purchase.
Laser printers use a special powdered ink called
.
Answer:
the printer works by spraying ink onto paper. Ink-Jet printers
use a laser beam and static electricity to transfer words and images to paper. Laser printers
are primarily business printers because they produce high-quality printed material and are expensive to purchase. Laser Printers
Laser printers use a special powdered ink called toner
Answer:
✔ inkjet
✔ Laser printers
✔ Laser printers
✔ toner
Explanation:
When should you use a relative hyperlink? group of answer choices when you need to link to a web page internal to your website always, the w3c prefers
When you need to link to a web page internal to your website, you should use a relative hyperlink. A relative hyperlink is a type of hyperlink that specifies the path to a file or web page relative to the current page. It is particularly useful when you want to link to pages within the same website.
1. Identify the web page or file you want to link to within your website.
2. Determine the relationship between the current page and the page you want to link to. For example, if the current page is in the same directory as the target page, the relationship is considered "sibling".
3. Construct the relative path by navigating through the directory structure. Use "../" to move up one level in the directory hierarchy.
4. Insert the relative path as the URL in the hyperlink code on your web page. For example, link text.
5. Test the hyperlink to ensure it works correctly.
Using a relative hyperlink allows you to easily update or move your website without breaking the links within it. It also helps maintain a clean and organized file structure.
In summary, you should use a relative hyperlink when you need to link to a web page internal to your website. By following the steps mentioned above, you can create effective and flexible links within your website.
Learn more about hyperlink code: https://brainly.com/question/33442132
#SPJ11
what statement regarding the use of the vmware horizon security server is accurate?
The accurate statement regarding the use of the VMware Horizon security server is that it can be installed on a server that is independent of Active Directory.
VMware Horizon is a virtual desktop infrastructure (VDI) solution that allows organizations to deliver virtualized desktops and applications to end users. The VMware Horizon security server is an important component of the solution, as it provides secure remote access to virtual desktops and applications without the need for a VPN. By using the secure server, organizations can provide remote access to their applications and data while maintaining a high level of security.
A key feature and benefit of VMware Horizon is that it simplifies the management and delivery of virtual desktops and applications, making it easier and more secure.
Complete Question
what statement regarding the use of the VMware Horizon security server is accurate?
O Security server can be installed on a server that is independent of Active Directory
O The VMM Management Server must be installed on a server that is a member of an Active Directory domain
O VMM Horizon makes delivery of virtualized desktops and apps easy and secure
O All statements above are accurate
To know more about VMware visit:
https://brainly.com/question/31672131
#SPJ11
Name three actions a database may perform? pls help
The three actions a database may perform are data retrieval, data modification and data security.
A database is an organized collection of data that can be easily accessed, managed, and updated. Three of the most common actions performed by databases are as follows:
1. Data Retrieval: Databases are primarily designed to retrieve data quickly and efficiently.
They allow users to access data from various tables and fields by running queries.
These queries help retrieve specific data based on different conditions and filters, and can also be used to join multiple tables together to create a more comprehensive view of the data.
2. Data Modification: Databases enable users to modify the stored data as per their requirements.
Users can add, edit, and delete records to ensure that the data remains accurate and up-to-date.
Additionally, databases allow for data validation to ensure that the data entered is correct and consistent.
3. Data Security: Databases provide various security measures to prevent unauthorized access and ensure the safety of the stored data.
They use authentication and authorization mechanisms to control user access, and implement backup and recovery procedures to protect against data loss.
Databases also provide audit trails to track user activities and identify any suspicious or malicious behavior.
For more questions on database
https://brainly.com/question/518894
#SPJ8
which record type should an adminstrator create to have a more user friendly name for a host machine
The record type that an administrator create to have a more user friendly name for a host machine is called 1: CNAME.
What is the purpose of a CNAME?A DNS record known as a "Canonical Name" or "CNAME" record translates an alias name to a real or "canonical" domain name. CNAME records are frequently used to link a subdomain, like www or mail, to the domain that hosts the content for that subdomain.
Therefore, When a domain or subdomain is an alias of another domain, the "canonical name" (CNAME) record is used in place of an A record. Never an IP address; only a domain may be referenced by CNAME records.
Learn more about user friendly from
https://brainly.com/question/17516705
#SPJ1
In the __________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network
In a man-in-the-middle attack, a perpetrator observes (or sniffs) network packets, modifies them, and then re-inserts them.
What is the man in the middle of the attack?An attempt to intercept and/or change data being sent between two communicating parties by placing an attacker between them.
Do you see a man in the middle of the assault?Deep packet inspection (DPI) and deep flow inspection (DFI) can also be used to identify man-in-the-middle attacks while a network is being monitored. Network monitors can access data such as packet size and length thanks to DPI and DFI. They can be used to spot suspicious web traffic
To know more about DPI visit:-
brainly.com/question/17156563
#SPJ4
coment on this if your user starts with dida
Answer:
oh sorry i needed points but i have a friend whos user starts with dida
Explanation:
Can someone help me write an algorithm and a flow chart pls for question 3
for i in range(20, 51, 2):
print(i)
Payton bought a couple new dog toys for her puppy. The bone she bought cost $5.25 and the frisbee cost $6.75. About how much did the toys cost?
Answer:
$12
Explanation:
1 00
5.25
+ 6.75
-------
12.00
what are some similarity's between NES console and consoles today
Answer:
what he said
Explanation:
Answer:
bro my question got deleted for no reason
Explanation:
oml this question has 500+ thanks...HOW
Answer:
nice
Explanation:
:)
Answer:
cool congratulations
the fast speed of _______ available today enable computers to work very fast
Answer:
main hardware components such as:
1. CPU
2. RAM
3. Motherboard (bus speed)
4. Hard drive
5. Video Card
6. Cache
7. Latest operating system (Windows XP, Windows 10, etc.)
network segments that are more accessible to the internet are known by what new term?
a. diz
b. screened subnet
c. enhanced subnet
d. none of these
Network segments that are more accessible to the internet are known by screened subnet
Screened SubnetA screened subnet, which is used in networks with both public and private areas, allows users to access the internet without exposing the local area network to internet-based cyber attacks or data breaches. This is accomplished by establishing a network between an internal network and an external/possibly hostile network, such as the internet. This ensures that there is no single point of failure that could compromise the entire enterprise network.
It makes use of three network interfaces:
Interface 1 is the internet-connected public interface.
Interface 2 is linked to the demilitarised zone (DMZ), to which hosted public services are linked.
Interface 3 provides access to and from internal networks by connecting to the intranet.
The main purpose of the subnet is to isolate the DMZ and its publicly accessible resources.
To know more about Screened Subnet, click on the link :
https://brainly.com/question/31147197
#SPJ1
(in c++):
Output "Valid" if input's length is less than or equal to 7. Otherwise, output "Invalid".
Ex: If input is test123, output:
Valid
Recall string's length() returns the length of the string. Ex: myString.length()
The program is an illustration of string manipulations
What are string manipulations?String manipulations include calculating the lengths of strings and also performing several operations on the string
The actual programThe complete program in C++ is as follows:
#include <iostream>
using namespace std;
int main(){
string passwordStr;
cin>>passwordStr;
if(passwordStr.length() <= 7){
cout<<"Valid";
}
else{
cout<<"Invalid";
}
return 0;
}
Read more string manipulation at:
https://brainly.com/question/14284563
define a hierarchical relationship define a recursive relationship define an arc relationship identify uids in a hierarchical, recursive and arc relationship model construct a model using recursion and hierarchies identify similarities and differences in an arc relationship and a supertype/subtype entity
A hierarchical relationship is a type of relationship between two entities in which one entity is the parent of the other entity, and the parent entity can have multiple child entities.
How is model structured?This relationship is often used to model the structure of a tree, where the parent entity represents the root of the tree and the child entities represent the branches and leaves.
A recursive relationship is a type of relationship in which an entity is related to itself. This can be used to model situations where an entity has multiple levels of self-referencing relationships, such as a tree structure where each node can have multiple child nodes.
An arc relationship is a type of relationship between two entities in which the relationship is represented by a directed arc or arrow.
To Know More About recursive relationship, Check Out
https://brainly.com/question/13566126
#SPJ4
PLS WILL GIVE BRAINLEST What eventually led to the abandonment of Jamestown?
malaria-carrying mosquitoes
a civil war
riots started by slaves
famine
Answer:
famine is the answer I believe
Answer:
D. Famine
Explanation:
Sir Thomas Gates, the newly named governor, found Jamestown in shambles with the palisades of the fort torn down, gates off their hinges, and food stores running low. The decision was made to abandon the settlement.
Adjust the code you wrote for the last problem to allow for sponsored Olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.
Sample Run 1
Enter Gold Medals Won: 1
For how many dollars was your event sponsored?: 5000
Your prize money is: 80000
Sample Run 2
Enter Gold Medals Won: 2
For how many dollars was your event sponsored?: 25000
Your prize money is: 175000
Sample Run 3
Enter Gold Medals Won: 3
For how many dollars was your event sponsored?: 15000
Your prize money is: 240000
Sample Run 4
Enter Gold Medals Won: 4
For how many dollars was your event sponsored?: 1
Your prize money is: 300001
The Get_Winnings(m, s) function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.
The code wrote for the last problem to allow for sponsored Olympic events is given below:
What is code?Code is a set of instructions, written using a programming language, that tell a computer what tasks to perform. It is a set of commands and instructions that allow a computer to perform specific tasks. Code can be used to create software applications, websites, games, and even mobile applications.
def Get_Winnings(m, s):
"""
Calculate the prize money for an Olympic event sponsored by a given dollar amount.
Parameters:
m (string): The number of gold medals won.
s (int): The amount of money sponsored for the event.
Returns:
int: The prize money won by the athlete.
string: "Invalid" if the sponsored amount is invalid.
"""
if s <= 0:
return "Invalid"
else:
medal_value = s * 8 # Each gold medal is worth 8x the sponsored amount
winnings = int(m) * medal_value
return winnings
To learn more about code
https://brainly.com/question/29330362
#SPJ1
what dog breed is this
a chow chow
b Siberian husky
c Portuguese pondego
d toy poodle
click picture for example
Answer:
C i'm pretty sure
Explanation:
Hope i help
In Python: Write a program to input 6 numbers. After each number is input, print the smallest of the numbers entered so far.
Sample Run:
Enter a number: 9
Smallest: 9
Enter a number: 4
Smallest: 4
Enter a number: 10
Smallest: 4
Enter a number: 5
Smallest: 4
Enter a number: 3
Smallest: 3
Enter a number: 6
Smallest: 3
Answer:
python
Explanation:
list_of_numbers = []
count = 0
while count < 6:
added_number = int(input("Enter a number: "))
list_of_numbers.append(added_number)
list_of_numbers.sort()
print(f"Smallest: {list_of_numbers[0]}")
count += 1
Which one of the following statements declares the string variables city, state, and zip using a single declaration statement?
a. string city, state, zip;
b. string city, string state, string zip;
c. string city; state; zip;
d. string city_state_zip;
The correct way to declare the string variables city, state, and zip using a single declaration statement is: string city, state, zip; Therefore the correct option is option C.
A declaration statement is a statement in a computer program that declares a variable or object. The declaration statement specifies the data type and name of the variable or object, allowing the program to reserve space in memory for it and assign it an initial value.
The syntax for declaring a variable in C++ is: data Type variable Name; Here, data Type represents the type of data the variable is to hold, such as integer, float, or string, and variable Name is the name given to the variable.
A variable may be declared and initialized in a single statement in C++. When a variable is initialized, it is given a value. This value can be the default value, which is zero for numerical types and null for pointer types, or a value specified in the declaration statement. Therefore the correct option is option C.
For such more question on declaration statement:
https://brainly.com/question/28962016
#SPJ11
How could I compare only the 1st letter of strings in the "names" list with the input?
So let's say we have the list:
list1 = ["Apple", "Banana", "Cherry"]
If we print this with indexes:
print(list1[0])
It'll show:
Apple
Now, we can add another index like:
print(list1[0][0])
And that'll show
A
In terms of information systems, a collaboration tool that helps a team communicate, organize, plan, schedule, track, and delegate jobs would be an example of A. a personal information system B. a workgroup information system C. an enterprise information system D. an organizational complement
An organizational complement is a collaboration tool that helps a team communicate, organize, plan, schedule, track, and delegate jobs. Option D is correct.
How is a computer system operated?An information system can contain information about a company and its surroundings. There are three fundamental processes that produce the information that businesses require: intake, production, and processing Feedback is the output that is provided to the appropriate groups or individuals within an organization so that they can evaluate and enhance the input.
An organizational supplement information system is a technological device that makes it easier for teams within an organization to communicate and work together to plan events, keep track of projects, and submit completed work.
Learn more about information system:
brainly.com/question/5419206
#SPJ4
NEED THIS ASAP!!!
Write a program to calculate the 4 basic arithmetic functions. Given two numeric inputs and an operation, have the program utilize an algorithm that will complete the function. Utilize if, else-if, and else statements efficiently for maximum credit.
good answers only please
number1 = float(input("Enter a number: "))
number2 = float(input("Enter a number: "))
operator = input("Enter the operator: ")
if operator == "+":
print("{} + {} = {}".format(number1, number2, (number1 + number2)))
elif operator == "-":
print("{} - {} = {}".format(number1, number2, (number1 - number2)))
elif operator == "*":
print("{} * {} = {}".format(number1, number2, (number1 * number2)))
else:
print("{} / {} = {}".format(number1, number2, (number1 / number2)))
I wrote my code in python 3. I hope this helps!
1. Which of the following words is a synonym for gigantic?
1.tiny
2. gorgeous
3. big
4. Green
Help asap
Answer:
3. big
Explanation:
gigantic means huge or enourmous. gigantic is basically just bigger big.
so uh- yeah.
I need help with this as soon as possible pls.
Complete the pseudocode for the following grading scale, following the style of the existing pseudocode.
Numerical Grade
Letter Grade
100 - 90
A
89 - 80
B
79 - 70
C
69 - 60
D
<= 59.4
F
/*IF grade >= 90
/* PRINT “A”
/*ELSEIF grade >=80 AND grade <= 89
/* PRINT “B”
/*
/* PRINT “C”
/*ELSEIF grade >=60 AND grade <= 69
/* PRINT “D”
/*ELSE
/* PRINT “F”
(It is not/*ELSEIF grade>=70 AND <=79)
Answer:
/*ELSEIF grade >=70 AND grade <= 79
Explanation:
You have to have the variable grade in both parts of the ELSEIF statement >=70 and <=79
The hint says t is not/*ELSEIF grade>=70 AND <=79 since this statement has the variable grade only at the >= part not the <= part
Information taken directly from an existing classified source and stated verbatim in a new or different document is an example of ______a.Restatingb.Extractingc.Generatingd.Paraphrasing
Option B is correct. When information is taken from an authorized source and re-worded in a new or different document, this is referred to as paraphrasing or restating.
When paraphrasing or restating information, derivative classifiers must exercise caution to ensure that the classification is not altered in the process. When information is extracted, it is taken directly from an authorized classification guideline source and presented verbatim in a new or different document. When information is taken from an authorized source and re-worded in a new or different document, this is referred to as paraphrasing or restating. A Security Classification Guide (SCG) is a compilation of accurate, comprehensive instruction on specific program, system, operation, or weapon system parts of classified information.
Learn more about information here-
https://brainly.com/question/15709585
#SPJ4
when flynn added a date field to a pivottable, excel grouped the date values into quarters, months, and years. what can flynn do if he does not want to group the pivottable this way?
If Flynn does not want to group the Pivot Table, then he can
Regroup the dates to show quarters only.Ungroup the dates.What is a Pivot Table?
The individual items in a larger table are aggregated into one or more discrete categories in a pivot table, which is a table of grouped data. This summary may comprise sums, averages, or other statistics, which the pivot table aggregates using a selected aggregation function applied to the aggregated information. If you need to track sums of long rows or columns of information that you can quickly compare to one another, pivot tables can be quite helpful.
Large volumes of data can be easily summarized interactively using pivot tables. A pivot table can be used to answer unexpected inquiries about your data and conduct an in-depth analysis of numerical data. A pivot table is particularly useful for Querying massive volumes of data in a variety of user-friendly ways.
To learn more about a pivot table, use the link given
https://brainly.com/question/29526863
#SPJ4
Create and copy a SUMIF function to calculate total earnings by branch office. Select cell E18. Start the SUMIF function with cells $D$5:$D$14 as the Range argument. Set the Criteria argument as a relative reference to cell C18. Select cells G5:G14 for the Sum_range argument and make the references absolute. Copy the formula in cell E18 to cells E19:E20 without formatting to preserve borders. Format cells E18:E21 as Currency
To create and copy a SUMIF function to calculate total earnings by branch office, follow these steps:
Select cell E18.
Type the following formula:
=SUMIF($D$5:$D$14,C18,$G$5:$G$14)
This formula uses the SUMIF function to sum the values in cells G5:G14 that meet the criteria in cell C18, which is the branch office.
Press Enter to calculate the result.
With cell E18 still selected, click on the Format Painter button in the Home tab of the ribbon.
Select cells E19:E20 to copy the formula without formatting.
Release the mouse button to copy the formula to the selected cells.
Select cells E18:E21.
Click on the Currency button in the Number group of the Home tab of the ribbon to format the cells as currency.
What is brawl stars app
Answer:
Brawl Stars is a multiplayer online battle arena and third-person hero shooter video game developed and published by the Finnish video game company Supercell.
Answer:
3v3 multiplayer and battle royale made for mobile! Play with friends or solo across a variety of game modes in under three minutes. Unlock and upgrade dozens of Brawlers with powerful Super abilities, Star Powers and Gadgets